Online training site Skillbox says that it has come up with an imaginative way to reach out to potential clients, and invite them to change their careers from being accountants and become graphical designers instead.

The Russian firm’s idea? To send a spam message to thousands of printers left open to the internet.

Millions of car owners were left at risk of having their vehicles stolen, because of the poor security of third-party app-connected car alarms.

Read more in my article on the Hot for Security blog.

]]>https://hotforsecurity.bitdefender.com/blog/hackable-car-alarms-leave-three-million-cars-at-risk-of-hijack-20932.html#new_tab/feed/0Facebook Messenger bug made it possible for hackers to see who you have been chatting withhttps://www.grahamcluley.com/facebook-messenger-bug-made-it-possible-for-hackers-to-see-who-you-have-been-chatting-with/
https://www.grahamcluley.com/facebook-messenger-bug-made-it-possible-for-hackers-to-see-who-you-have-been-chatting-with/#respondFri, 08 Mar 2019 11:34:55 +0000https://www.grahamcluley.com/?p=296125

A security researcher has revealed details of a flaw in Facebook Messenger that made it possible for “any website to expose who you have been messaging with.”

Twerking robot assistants, an app from Saudi Arabia that lets men track women, and a gnarly skiing security snarl-up!

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by technology journalist Geoff White.

How would *you* track someone who owed you money? What was the colossal flaw Facebook left on its website for anyone to exploit and hijack accounts? And what excuse are insurance companies giving for not paying victims of the NotPetya malware millions of dollars?

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Joe Carrigan of the Information Security Institute at Johns Hopkins University.

Coinmama, a site that is supposed to “make it fast, safe and fun” to buy Bitcoins and Etherium with a credit card, has suffered a data breach that has resulted in almost half a million customers having their personal details breached.

There will be many angry customers of VFEmail who will be distraught at the thought that years’ worth of irreplaceable personal and business correspondence may have been wiped out. It’s understandable that some might turn their fury towards VFEmail.

Jack Rhysider from the “Darknet Diaries” podcast joins us to chat about his interview with the elusive Hacker Giraffe, how a death is preventing cryptocurrency investors from reaching their money, and how ‘beauty camera’ apps are redirecting users to phishing websites and stealing their selfies.

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast, hosted by computer security veterans Graham Cluley and Carole Theriault.

FaceTime bug allows callers to see and hear you *before* you answer the phone, Facebook’s Nick Clegg tries to convince us the social network is changing its ways, and IoT hacking is big in Japan.

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by John Hawes from AMTSO.

A California family has described the ‘sheer terror’ it experienced after its smart security camera began broadcasting a bogus warning that three North Korean missiles were heading to the United States.

Users of the popular WordPress translation plugin WPML (also known as WordPress MultiLingual) received an email from a hacker claiming to expose serious security vulnerabilities in the software that allegedly put the customers’ own websites at risk.

Why a business spat resulted in Liberia falling off the internet, how the US Government shutdown is impacting website security, and the perplexing world of extreme IoT devices.

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest Zoë Rose.

]]>https://www.grahamcluley.com/smashing-security-111-when-rivals-hack-and-extreme-baby-monitors/feed/1Huge prizes up for grabs for anyone who can hack a Teslahttps://hotforsecurity.bitdefender.com/blog/huge-prizes-up-for-grabs-for-anyone-who-can-hack-a-tesla-20743.html#new_tab
https://hotforsecurity.bitdefender.com/blog/huge-prizes-up-for-grabs-for-anyone-who-can-hack-a-tesla-20743.html#new_tab#respondTue, 15 Jan 2019 14:10:27 +0000https://www.grahamcluley.com/?p=294564

This year, for the first time ever, a popular car will be amongst the products hackers will be trying to exploit at the Pwn2Own contest.

Twitter and the not-so-ethical hacking of celebrity accounts, study discovers how you can pay someone to quit Facebook for a year, and the millions of dollars you can make from uncovering software vulnerabilities.

All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis.